Computer Forensics Quiz – Evidence Handling & Procedures

  • 9th Grade,
  • 10th Grade,
  • Grade 11th,
  • Grade 12th
  • ISO/IEC 27037
  • NIST SP 800-86
Reviewed by Godwin Iheuwa
Godwin Iheuwa, MS (Computer Science) |
Database Administrator
Review Board Member
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.
, MS (Computer Science)
By Ttemple
T
Ttemple
Community Contributor
Quizzes Created: 1 | Total Attempts: 16,987
| Attempts: 16,987 | Questions: 15 | Updated: Dec 5, 2025
Please wait...
Question 1 / 15
0 %
0/100
Score 0/100
1. Physical forensics includes which of the following?

Explanation

Bloodstain analysis falls within physical forensics because it involves examining biological material, pattern formation, and scene reconstruction. Physical forensics deals with tangible evidence such as fingerprints, hair, bodily fluids, and impact patterns. By studying bloodstains, investigators can infer positions, movements, and sequence of events. The other listed options are unrelated activities, making bloodstain analysis the only valid selection matching recognized physical forensic practices in crime scene investigation.

Submit
Please wait...
About This Quiz
Computer Forensics Quiz  Evidence Handling & Procedures - Quiz

This Computer Forensics Quiz is designed to test your knowledge of forensic principles, evidence handling, investigation procedures, and essential terminology used in digital crime analysis. It covers chain of custody, forensic documentation, scene preservation, electronic evidence collection, and critical decision-making required during digital investigations.

If you’re studying... see morefor a digital forensics exam, reviewing cybercrime investigation basics, or practicing incident response procedures, this quiz provides valuable reinforcement. Use this quiz to validate your readiness, improve situational judgment, and develop confidence in applying forensics concepts. see less

2.
You may optionally provide this to label your report, leaderboard, or certificate.
2. Computer forensics is a branch of digital forensic science.

Explanation

Computer forensics is indeed a branch of digital forensic science because it focuses specifically on investigating evidence stored or transmitted through digital computing devices. It involves recovering deleted information, analyzing storage media, examining system activity, and identifying artifacts that support legal cases. Digital forensic science is a broader discipline, while computer forensics specializes within that framework. Therefore, the statement correctly identifies computer forensics as one component of the larger digital forensics field.

Submit
3. What should be documented on audio?

Explanation

Arrival time is documented on audio because verbal timestamps help establish when investigators reached the scene. Audio logs create chronological records without requiring visual footage or written notes. Stating arrival time ensures transparency, preserves sequence of events, and supports later reconstruction. Visual actions such as zooming or close-ups belong to video documentation, while written notes belong to paper logs. Therefore, arrival time is the correct item to record using audio.

Submit
4. Which equipment is NOT needed for recording video?

Explanation

Pencil and paper are unnecessary for video recording because video documentation relies on electronic tools such as cameras, charged batteries, storage media, and accurate date/time settings. These components ensure visual evidence is captured clearly and reliably. Although written notes may assist separate documentation, they are not required for the technical act of recording video. Therefore, they do not qualify as essential equipment for preparing to record forensic video footage.

Submit
5. One of the three C’s in computer forensics is…

Explanation

Control is one of the three C’s in computer forensics, along with chain of custody and documentation of correct procedures. Control refers to regulating access and preventing unauthorized interaction with digital evidence. Maintaining control ensures the integrity, reliability, and admissibility of evidence during legal proceedings. Without proper control measures, contamination or alteration could occur, jeopardizing the credibility and usefulness of the collected digital information.

Submit
6. This is the ________ life cycle in computer forensics.

Explanation

Investigation is the correct term in the computer forensics life cycle because this stage involves collecting evidence, identifying sources, analyzing data, and determining relevance. The cycle often includes identification, preservation, collection, examination, analysis, and reporting. Investigation ties together discovery and interpretation, making it central to the overall forensic process. It ensures that evidence is gathered properly and examined logically, forming the foundation for conclusions and legal documentation within the forensic workflow.

Submit
7. Which is not a step in the scientific method?

Explanation

“Wait to test” is not part of the scientific method because the method emphasizes active inquiry. Scientific investigation involves forming questions, developing hypotheses, performing experiments, analyzing results, and drawing conclusions. Inaction or delay does not contribute to data collection or hypothesis evaluation. Therefore, waiting contradicts the systematic and empirical nature of scientific processes, making it the only choice that does not align with standard scientific methodology.

Submit
8. Officials setting up a perimeter around a crime scene are…

Explanation

Law enforcement officials secure crime scenes by setting perimeters to control access and preserve evidence. Establishing boundaries prevents contamination, maintains order, and ensures that only authorized personnel enter. This practice protects the integrity of physical and digital evidence. Civilians do not perform this duty, and the other listed options do not represent entities responsible for crime scene control. Therefore, law enforcement is the correct term describing personnel who establish crime scene perimeters.

Submit
9. What happens first when securing the area?

Explanation

Ensuring scene safety is the first action in securing any area because investigators must protect themselves, victims, and evidence. A safe environment prevents hazards, unauthorized access, and accidental contamination. Only after safety is ensured can evidence collection begin. Identifying threats, establishing boundaries, and controlling entry points are part of this step. Without initial safety measures, subsequent forensic actions could compromise both personnel and evidence.

Submit
10. The investigator-in-charge must identify and ________ e-evidence.

Explanation

Collecting electronic evidence is a core responsibility of the investigator-in-charge because proper evidence acquisition ensures accuracy, integrity, and completeness. Electronic evidence must be gathered systematically using approved forensic tools and methods to avoid contamination or alteration. The collected data becomes the foundation for subsequent analysis, making the “collect” step crucial for maintaining a defensible chain of custody and preserving admissible digital evidence throughout the investigation process.

Submit
11. What do you do with a computer that is turned off?

Explanation

Leaving a powered-off computer untouched preserves evidence because powering it on could alter logs, timestamps, or system states. Turning it on may overwrite crucial data, trigger encryption, or modify files. Forensic best practices emphasize maintaining the original condition of devices until proper imaging tools are available. Therefore, leaving the device off protects the authenticity and integrity of electronic evidence during initial response at a digital crime scene.

Submit
12. What should you do if the computer is turned on?

Explanation

Logging the user off preserves volatile data and maintains system integrity without abruptly cutting power. Shutting down or unplugging risks losing RAM-resident information such as running processes, unsaved files, or encryption keys. Forensic guidelines advise minimally interacting with active systems while maintaining their operational state for imaging. Logging the user off reduces interaction while preventing further user activity, balancing preservation and control. Therefore, it is the appropriate response when encountering an active system.

Submit
13. Which tool is needed in computer forensics?

Explanation

A backup computer is essential in forensic work because investigators must analyze digital evidence without altering original systems. Using a secondary machine protects data integrity, enables safe testing of forensic tools, and ensures continuity if equipment fails. Latex gloves protect physical evidence but are less central to digital tasks, while sunlight and toothbrushes have no relevance. Therefore, a dedicated backup computer is the most critical tool among the given choices.

Submit
14. Which is not a type of forensic record?

Explanation

Searching the crime scene is an investigative action, not a documented record. Forensic records include the chain of custody, crime scene documentation, and detailed logs of examiner actions. These written records preserve transparency, accountability, and the integrity of evidence handling. They provide verifiable proof of how evidence was discovered, processed, transferred, and secured, ensuring its admissibility in court. Therefore, searching itself is not categorized as a record.

Submit
15. The most important thing to track is the ________.

Explanation

Tracking date and time is essential because forensic work depends on precise chronological documentation. Accurate timestamps support chain of custody, event reconstruction, and timeline verification. Nearly all digital evidence includes time-sensitive metadata, so maintaining synchronized logs ensures consistency across devices and reports. Incorrect time records may weaken investigative conclusions or legal admissibility. Therefore, date and time are the most important elements to monitor throughout the investigation.

Submit
×
Saved
Thank you for your feedback!
View My Results
Godwin Iheuwa |MS (Computer Science) |
Database Administrator
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.
Cancel
  • All
    All (15)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Physical forensics includes which of the following?
Computer forensics is a branch of digital forensic science.
What should be documented on audio?
Which equipment is NOT needed for recording video?
One of the three C’s in computer forensics is…
This is the ________ life cycle in computer forensics.
Which is not a step in the scientific method?
Officials setting up a perimeter around a crime scene are…
What happens first when securing the area?
The investigator-in-charge must identify and ________ e-evidence.
What do you do with a computer that is turned off?
What should you do if the computer is turned on?
Which tool is needed in computer forensics?
Which is not a type of forensic record?
The most important thing to track is the ________.
Alert!

Advertisement